Agile Conversations

Agile Conversations

Author: Douglas Squirrel

Publisher: IT Revolution

Published: 2020-05-12

Total Pages: 186

ISBN-13: 1942788665

DOWNLOAD EBOOK

A successful digital transformation must start with a conversational transformation. Today, software organizations are transforming the way work gets done through practices like Agile, Lean, and DevOps. But as commonly implemented as these methods are, many transformations still fail, largely because the organization misses a critical step: transforming their culture and the way people communicate. Agile Conversations brings a practical, step-by-step guide to using the human power of conversation to build effective, high-performing teams to achieve truly Agile results. Consultants Douglas Squirrel and Jeffrey Fredrick show readers how to utilize the Five Conversations to help teams build trust, alleviate fear, answer the “whys,” define commitments, and hold everyone accountable.These five conversations give teams everything they need to reach peak performance, and they are exactly what’s missing from too many teams today. Stop focusing on processes and practices that leave your organization stuck with culture-less rituals. Instead, unleash the unique human power of conversation.


Web-Based Services: Concepts, Methodologies, Tools, and Applications

Web-Based Services: Concepts, Methodologies, Tools, and Applications

Author: Management Association, Information Resources

Publisher: IGI Global

Published: 2015-11-09

Total Pages: 2461

ISBN-13: 146669467X

DOWNLOAD EBOOK

The recent explosion of digital media, online networking, and e-commerce has generated great new opportunities for those Internet-savvy individuals who see potential in new technologies and can turn those possibilities into reality. It is vital for such forward-thinking innovators to stay abreast of all the latest technologies. Web-Based Services: Concepts, Methodologies, Tools, and Applications provides readers with comprehensive coverage of some of the latest tools and technologies in the digital industry. The chapters in this multi-volume book describe a diverse range of applications and methodologies made possible in a world connected by the global network, providing researchers, computer scientists, web developers, and digital experts with the latest knowledge and developments in Internet technologies.


Taking Aim

Taking Aim

Author: Mark C. Donovan

Publisher: Georgetown University Press

Published: 2001

Total Pages: 164

ISBN-13: 9780878408290

DOWNLOAD EBOOK

Donovan does not say what he is up to these days, but over a decade ago he was doing HIV-prevention outreach with injection drug users, and wondered why the policymakers bemoaning the number of children with HIV restriction prevention among the very people who were parenting those children. He found that contradictions of policy are usually intertwined with the complexities of representational government. Annotation copyrighted by Book News Inc., Portland, OR


Security and Privacy in Communication Networks

Security and Privacy in Communication Networks

Author: Bhavani Thuraisingham

Publisher: Springer

Published: 2016-01-23

Total Pages: 742

ISBN-13: 3319288652

DOWNLOAD EBOOK

This volume constitutes the thoroughly refereed post-conference proceedings of the 11th International Conference on Security and Privacy in Communication Networks, SecureComm 2015, held in Dallas, TX, USA, in October 2015. The 29 regular and 10 poster papers presented were carefully reviewed and selected from 107 submissions. It also presents 9 papers accepted of the workshop on Applications and Techniques in Cyber Security, ATCS 2015. The papers are grouped in the following topics: mobile, system, and software security; cloud security; privacy and side channels; Web and network security; crypto, protocol, and model.


Computer Security

Computer Security

Author: Matthew A. Bishop

Publisher: Addison-Wesley Professional

Published: 2003

Total Pages: 1144

ISBN-13: 9780201440997

DOWNLOAD EBOOK

The importance of computer security has increased dramatically during the past few years. Bishop provides a monumental reference for the theory and practice of computer security. Comprehensive in scope, this book covers applied and practical elements, theory, and the reasons for the design of applications and security techniques.